In my recent scan of Nessus i found most of the system reported with "SSL Medium Strength Cipher Suites Supported". I tried the solutions mentioned in "http://blogs.iis.net/sakyad/archive/2008/12/11/enforcing-ssl-3-0-and-removing-weak-encryption-vulnerability-over-ssl-iis-6-0-and-isa.aspx" but some of the servers are still reported for vulnerability.Kindly suggest the way out for resolving the same in more than 1000+ server remotely.

What webservers are running on the other hosts that are reported as vulnerable, are the results for webservers or other devices?Are all the webservers running IIS?Are you saying that after following the suggestions on the website above, the servers are still being reported as vulnerable?What details are reported for the vulnerability in Nessus, is the following message the same: http://www.nessus.org/plugins/index.php ... e&id=42873 ?

You should have a list of ciphers reported as having a key length of 56 bits or 112 bits or less from the Nessus scan, and you could focus on addressing just those ciphers. The following Microsoft KB article describes how to disable the various weak ciphers: http://support.microsoft.com/kb/245030There are many other references to disabling weak cipher keys on IIS 6, for example: http://www.waynezim.com/2011/03/how-to- ... rs-in-iis/ which also describes using a tool called SSLScan to test the ciphers easily.